Research Article
The Application of Computer Intelligence in the Cyber-Physical Business System Integration in Network Security
Table 1
LSTM-AutoEncoder code architecture diagram.
| Inputs = input (shape = (train_data.shape [1]), train_data.shape [2]) |
| # ENCODER | L1 = LSTM (64, activations = relu) (inputs) | L2 = RepeatVector (train_data.shape [1]) (L1) | # DECODER | L3 = LSTM (64, activations = relu, return_sequences = True) (L2) | Outputs = TimeDistributed (dense (train_data.shape [2])) (L3) | LSTM-AE = Model (inputs = inputs, outputs = outputs) | Inputs = input (shape= (train_data.shape [1]), train_data.shape [2]) | # ENCODER | L1 = LSTM (64, activations = relu) (inputs) |
|
|